Lines Matching defs:frame

308  * ago the last Beacon or Probe Response frame was received)
312 * @parent_tsf: Time when the Beacon/Probe Response frame was received in terms
328 * frame (or if the driver does not indicate source of IEs, these may also be
329 * from Beacon frame). After the first set of IEs, another set of IEs may follow
614 * - Accept broadcast Probe Response frame.
615 * - Probe Request frame deferral and suppression.
618 * - Send 1st Probe Request frame in rate of minimum 5.5 Mbps.
652 * auth_data - Additional elements for Authentication frame
756 * own_addr - Source address and BSSID for authentication frame
776 * ie - authentication frame ie buffer
954 * mgmt_frame_protection - IEEE 802.11w management frame protection
980 * drop_unencrypted - Enable/disable unencrypted frame filtering
1097 * fils_kek - KEK for FILS association frame protection (AES-SIV)
1107 * fils_nonces - Nonces for FILS association frame protection
1216 * beacon_rate: Beacon frame data rate
1218 * This parameter can be used to set a specific Beacon frame data rate
1222 * Beacon frame data rate is used.
1627 /** Driver supports Beacon frame TX rate configuration (legacy rates) */
1629 /** Driver supports Beacon frame TX rate configuration (HT rates) */
1631 /** Driver supports Beacon frame TX rate configuration (VHT rates) */
1751 * frame is Link Measurement Report (part of RRM). Another is TPC Report (part
1753 * offset, namely the 6th byte in the Action frame body.
1866 * This interface shares its address and Beacon frame with the main
1874 * This interface has its own address and Beacon frame.
2041 * @head: Head portion of Beacon frame (before TIM IE)
2042 * @tail: Tail portion of Beacon frame (after TIM IE)
2048 * @probe_resp: Probe Response frame template
2382 * frame
2583 * send_mlme - Send management frame from MLME
2585 * @data: IEEE 802.11 management frame with IEEE 802.11 header
2586 * @data_len: Size of the management frame
2587 * @noack: Do not wait for this frame to be acked (disable retries)
2588 * @freq: Frequency (in MHz) to send the frame on, or 0 to let the
2725 * frame by concatenating the head part with TIM IE generated by the
2856 * @encrypt: Whether the frame should be encrypted
2869 * @own_addr: Source address and BSSID for the Deauthentication frame
2871 * @reason: Reason code for the Deauthentiation frame
2875 * a Deauthentication frame to be sent to it.
2883 * @own_addr: Source address and BSSID for the Disassociation frame
2885 * @reason: Reason code for the Disassociation frame
2889 * a Disassociation frame to be sent to it.
3141 * of (Re)Association frame processing, the assocresp buffer includes
3143 * whenever a (Re)Association Request frame indicated use of WPS.
3183 * send_action - Transmit an Action frame
3192 @ @no_cck: Whether CCK rates must not be used to transmit this frame
3196 * frame to the specified destination.
3198 * If the %WPA_DRIVER_FLAGS_OFFCHANNEL_TX flag is set, the frame will
3203 * if a remain-on-channel duration is in progress, the frame must be
3204 * transmitted on that channel; alternatively the frame may be sent on
3216 * send_action_cancel_wait - Cancel action frame TX wait
3220 * frame. It is only available when %WPA_DRIVER_FLAGS_OFFCHANNEL_TX is
3257 * to receive a response to an Action frame and the response is
3331 * send_frame - Send IEEE 802.11 frame (testing use only)
3333 * @data: IEEE 802.11 frame with IEEE 802.11 header
3334 * @data_len: Size of the frame
3335 * @encrypt: Whether to encrypt the frame (if keys are set)
3436 * wnm_oper - Notify driver of the WNM frame reception
3587 * @own_addr: Source address and BSSID for association frame
3596 * Response frame to the station.
3934 * @validation: frame validation policy (0 = Disabled, 1 = Checked,
4057 * probe_mesh_link - Inject a frame over direct mesh link to a given
4061 * @eth: Ethernet frame to be sent
4062 * @len: Ethernet frame lengtn in bytes
4124 * configure_data_frame_filters - Request to configure frame filters
4300 * receiving deauthenticate or disassociate frame from the AP or when
4426 * to receiving deauthenticate frame from the AP or when sending that
4427 * frame to the current AP.
4467 * EVENT_RX_MGMT - Report RX of a management frame
4491 * EVENT_RX_PROBE_REQ - Indicate received Probe Request frame
4493 * This event is used to indicate when a Probe Request frame has been
4494 * received. Information about the received frame is included in
4509 * authenticator when receiving a frame from a device. The address of
4515 * EVENT_EAPOL_RX - Report received EAPOL frame
4581 * EVENT_UNPROT_DEAUTH - Unprotected Deauthentication frame received
4583 * This event should be called when a Deauthentication frame is dropped
4586 * details of the frame.
4591 * EVENT_UNPROT_DISASSOC - Unprotected Disassociation frame received
4593 * This event should be called when a Disassociation frame is dropped
4596 * details of the frame.
4918 * resp_frame - (Re)Association Response frame
4923 * resp_frame_len - (Re)Association Response frame length
4983 * in a valid EAPOL-Key frame
5062 * Deauthentication frame
5067 * ie - Optional IE(s) in Disassociation frame
5077 * locally_generated - Whether the frame was locally generated
5093 * Deauthentication frame
5098 * ie - Optional IE(s) in Deauthentication frame
5108 * locally_generated - Whether the frame was locally generated
5294 const u8 *frame;
5303 * the frame.
5308 * freq - Frequency (in MHz) on which the frame was received
5369 * sa - Source address of the received Probe Request frame
5374 * da - Destination address of the received Probe Request frame
5380 * bssid - BSSID of the received Probe Request frame or %NULL
5487 * @ack: Indicates ack or lost frame
5489 * This corresponds to hapd_send_eapol if the frame sent